Author Archive

Think Again: The Power of Knowing What You Don’t Know by Adam Grant

Thursday, July 1st, 2021
Think Again

Think Again: The Power of Knowing What You Don’t Know by Adam Grant offers advice about rethinking that all of us can use at work and beyond. The key is to think like a scientist. This means you have to actively try to disprove your own ideas as a way of testing their quality. This would make a great text for any leadership course and an outstanding read for anyone seeking self-improvement. Make sure that there is a copy in your professional development library.

Prologue

  • This book is about the value of rethinking your assumptions, instincts, and habits while keeping an open mind. It starts with a story about wildfire fighters who when trapped neglected at first to drop their heavy gear as it was part of their identity and dropping it would signal failure. One man started a fire that in effect burned a hole through the fire and saved his life. This required rapid rethinking as this technique wasn’t taught in fire school. Due to the pandemic, we have also seen many leaders being slow to rethink their assumptions. This book is an invitation to let go of knowledge and opinions that are no longer serving you well. A hallmark of wisdom is knowing when to abandon some of your most treasured tools as you seek new solutions to old problems.

Part I. Individual Rethinking – Updating Our Own Views

1. A Preacher, a Prosecutor, a Politician, and a Scientist Walk into Your Mind

  • The big idea here is to think like a scientist rather than a preacher, a prosecutor, or a politician. This requires that you revisit your beliefs to see if new evidence has made them obsolete. The worst bias is thinking that you aren’t biased. Be careful to avoid confirmation bias where you only look for facts that support your beliefs and desirability bias where you see what you want to see. Scientists are actively open-minded searching for reasons why they might be wrong. Your IQ may work against you as smart people recognize patterns faster, which can lead to seeing more stereotypes. If you are trying to promote a change, reinforce the things that will stay the same.

2. The Armchair Quarterback and the Imposter: Finding the Sweet Spot of Confidence

  • Here we meet two opposing syndromes. The Armchair Quarterback Syndrome happens when confidence is greater than competence. The Imposter Syndrome happens when competence is greater than confidence. Arrogance is ignorance plus conviction. Humility allows you to absorb life’s experiences and convert them into knowledge and wisdom. A mix of confidence and humility gives us enough doubt to reexamine our old knowledge and confidence to pursue new insights. Most effective leaders score high in both confidence and humility.
  • Adam believes that there are benefits associated with the Imposter Syndrome. It can motivate you to work harder. It can allow you to work smarter as you question old assumptions. Finally, it can make you a better learner as you realize that you might have something you need to learn. You are more likely to seek other opinions. It can keep you on your toes as you never think you know it all. You maintain doubts as you know you are partially blind and committed to improving your sight. Each answer raises new questions and your quest for knowledge is never finished. Arrogance, however, leaves you blind to your weaknesses.

3. The Joy of Being Wrong: THe Thrill of Not Believing Everything You Think

  • Most of us are wrong more often than we like to admit. Rather than being upset when you find that you are wrong about something, it’s better to tell yourself that it means you are now less wrong than before. You can even be joyful if you realize that it means you have learned something. Adam recommends that you allow learning from being wrong to let you detach from your past and to also live so that your opinions are detached from your identity. This will make it easier when a core belief is challenged.
  • A study of professional forecasters showed that the most important driver of success was how often they updated their beliefs. The best went through more rethinking cycles. They have the confident humility to doubt their judgment and the curiosity to discover new information and rethink their predictions. You should view your opinions as hunches and know that something isn’t true just because you believe it. Emotions can also get in the way. When you feel strongly about something you are less likely to change your mind when new facts present themselves. This is why so many respected predictors failed to predict Trump’s victory in 2016.

4. The Good Fight Club: The Psychology of Constructive Conflict

  • There are two kinds of conflicts. There are relationship conflicts where people essentially don’t like each other, and there are task conflicts where people disagree about how to do something. The former get in the way of success, while the latter usually helps people to work together successfully. Task conflict brings out the diversity of thought. It can help us stay humble, surface doubts, and make us curious about what we might be missing. It can lead us to think again moving us closer to the truth without damaging our relationships. What matters to children is not how little their parents argue, but how respectfully they argue.
  • It’s possible to disagree without being disagreeable. Disagreement is key when it comes to task conflict. The trick is not let task conflict turn into relationship conflict. As a leader, you want to promote the idea that disagreement is necessary for growth and success. It’s also key that leaders show they believe and care about the people with who they disagree. This can make disagreement seem like a sign of respect. Try to frame disputes as debates. This signals that you are receptive to considering dissenting opinions and changing your mind. Don’t fall into the trap that some leaders fall into by surrounding yourself with agreeable people. They shield themselves from task conflict by eliminating boat-rockers and listening to boot-lickers.
Share this:
Share this page via Email Share this page via Stumble Upon Share this page via Digg this Share this page via Facebook Share this page via Twitter Share this page via Google Plus

Keeping Your Personal Information Safe While You’re Online by Craig Middleton

Monday, June 28th, 2021

Library
Keeping Your Personal Information Safe While You’re Online by Craig Middleton offers sound and easy advice for online users of all ages and experiences. By now you have no doubt heard about high-profile cyber attacks, but cybercriminals are happy to go after ordinary people in addition to governmental agencies and large corporations. Thanks, Craig.

Introduction

  • If you’re a college student, your two best friends may be your laptop and the internet. Much of what you do in higher learning is online, from researching various sites to get info for a paper you’re writing, to accessing the school’s and each teacher’s online learning platforms. With all the demands of life you need to pay attention to, staying secure on the internet is probably one of the last things on your mind. Unfortunately, cybercriminals are counting on your lack of attention to this very important detail. Next time you’re putting your nose to the grindstone with your schoolwork, consider these four easy steps to keep your information safe while online.

Use Free Wi-Fi Carefully

  • Most college students don’t think twice about using the free wi-fi in the school’s library or a coffee shop to fit in a little studying during a break between classes. The library is a great place to get ahead in an environment of peace and quiet, but this study choice has one caveat you must be aware of: the school’s internet is on a public network. Spending time online while on a public network makes you vulnerable to a cyberattack.
  • So, What is a cyber attack, you might ask? A cyber attack is an unlawful effort to compromise a computer or computer network. Usually, this is done with the aim of sharing, destroying, or stealing digital information. Using free wi-fi offered on public networks makes you a prime target for someone wishing to compromise your computer. All they need is a basic software tool to access your information.
  • There are many ways to keep your information safe while using the internet at school, but the following three steps are a good start. First, make sure you don’t use the same password for all of your log-ins. Secondly, ensure that you are on the public network that belongs to your school. Finally, disable file sharing while you are on the public network. This will go a long way in securing your personal information while using the internet at school.

Visit Secure Sites

  • Studying and researching for your classes takes you to a wide variety of sites, including some you may not be very familiar with. Making sure to only visit secure sites is a vital way to protect your information while online. The good news is that a secure site is easy to distinguish from a harmful one. If the online address has a lock symbol before it and begins with HTTPS, you can rest assured you are safe to visit that site. (Doug: Note that my site’s address is https:DrDougGreen.Com)

Beware of Unusual Links and Attachments

  • A common way that your information is compromised online is by clicking on harmful links and attachments, often sent to you through email. What might look like an email from a trusted company or organization could be a virus or malware attack in disguise. The easiest way to tell if a link or attachment is harmful is by checking to see if there are spelling errors or if the email is coming from an address other than the one you would expect from a company. If either of these things are amiss, you are probably dealing with a cybercriminal and you should steer clear. (Doug: For example, if you got an email from Verizon, be sure that the address of the sender ends in Verison.Com. Also, if you get an email from a bank where you don’t have an account it’s probably spam. Update: Today I received an email from Sprectrum saying “Action Required.” When I checked the address of the sender it said mmecomn@carolina.rr.com>. This clearly is not from Spectrum so I erased it.)

Use Strong Passwords

  • Using strong passwords is one of the simplest ways to protect your information online. With all of the online accounts you have to juggle, it can be very tempting to use the exact same password every time to make remembering them easier, but this is one of the cyber criminal’s favorite weaknesses. If one account becomes compromised, then they will all fall victim. Be sure to use a different password every time you create an online account. As a college student, you have enough to worry about as it is. Don’t add the security of your online information to that list. Follow these four simple steps and you won’t have to think twice about it.

Craig Middleton

  • Craig is a New York City-based retired business consultant, who is an expert in education and cultural trends. He has a Masters of Business Administration and a Masters in Education from St. Johns and loves sharing his knowledge on the side through his writing. If you have any questions or comments you can direct them to Craig at craigmiddleton18@gmail.com.
Share this:
Share this page via Email Share this page via Stumble Upon Share this page via Digg this Share this page via Facebook Share this page via Twitter Share this page via Google Plus

Dealing With Cyberbullying in the Era of Remote Learning by Amanda Winstead

Wednesday, June 23rd, 2021

Cyberbully
Dealing With Cyberbullying in the Era of Remote Learning by Amanda Winstead offers sound advice for parents, educators, and students on this timely topic. The key is communication and making time for it. Since cyberbullies leave a digital trail, it’s vital that students feel safe when it comes to sharing this type of abuse with adults they trust.

Introduction

  • Education is often in a state of evolution. Standards change, learning theories develop, and certainly, budgets make their difference. One of the ways that teachers, students, and parents have seen developments in the last decade or so, is the inclusion of digital tools as a day-to-day part of school operations. Everything from artificial intelligence (AI) and algorithm-driven assessments to social media continue to be adopted in learning environments.
  • This technological acceptance has also been instrumental in keeping classes open during the COVID-19 pandemic. Remote learning has kept students and teachers connected. Not to mention that these distant learning tools make education more accessible for both K-12 kids and other young adults. However, it can’t be denied that bullying is still a concern. Though the physical boundaries of the classroom have been removed, cyberbullies have found ways to continue inflicting abuse in various toxic forms.
  • Let’s take a look at how parents and teachers can best deal with cyberbullying, especially when it comes to keeping environments around children safe and secure.

Maintain Awareness

  • When schooling is being offered at home, there aren’t the same ground rules that prevent device use during lessons, and as such, the culture of near-constant connection through smartphones can make bullying seem inescapable. Therefore, teachers and parents alike need to maintain an awareness of the methods used for cyberbullying. Girls are usually the most common recipients of cyberbullying, and there is a tendency for those aged 15-17 to be targeted through mobile email and their social media channels. This often takes the familiar forms of name-calling and rumor-spreading but occurs in a very public space.
  • It’s also worth noting that cyberbullying doesn’t just occur on social media, but is increasingly present in gaming, and even the comment sections of websites. This can make it all the more difficult for teachers and parents to address, as it occurs on platforms that are disconnected from the classroom and in the public domain.
  • The upshot is often one of the best tools against cyberbullying is the ability to recognize signs it may be occurring. Alongside knowledge of the methods that might be utilized, keeping vigilant of how students’ behavior has changed can help to guide intervention. This could include anxiety or reluctance to use online platforms as part of their school work, reticence to discuss their social media platforms or share their accounts, and generally becoming withdrawn. It can even present as less enthusiasm for utilizing technology when it may have been a key interest in the past.

Keep Talking

  • Cyberbullying, like most other forms of abuse, thrives in silence. In remote school settings, it can be easy for students to feel disconnected from friends and teachers or feel that there isn’t a platform to discuss their problems, causing additional stress. Therefore, teachers, parents, and students need to work together to ensure there is always a space for discussion.
  • This begins with making sure that there are accessible communications channels. Certainly, teachers should ensure that both students and parents are provided with contact details to arrange meetings if there are potential issues. However, there should also be regular time set aside for educators to check in with individual learners. School administrators must allow time in the schedule for teachers to have conversations with students about how they are doing, and talk about things they are concerned about. Indeed, providing remote access to the school’s counselor can create a valuable safe space.
  • That said, there also needs to be effort put in place for open discussions. Schools need to educate remote students on how bullying presents and the consequences it can cause. For instance, in teenagers, body image is likely to affect their self-esteem and mental wellness. Society and the media — including social media — have often advertised unattainable standards, and this can be weaponized by cyberbullies. Teachers need to talk with their remote classes about this and help them to recognize when appearance-based bullying is designed to hurt them rather than being an accurate reflection of reality. Keep students part of this discussion, too, encouraging them to share behaviors they find concerning, and how you can all work together to address them.

More Serious Concerns For Teens

  • Many of the methods of cyberbullying are going to be through social media platforms and other means that most teens are already familiar with, such as abusive comments on social media channels, harassing emails, and so on. However, one of the more concerning issues that can affect teenagers is revenge porn. This is largely when a former sexual partner publicly posts private explicit images online as a form of particularly damaging revenge. This causes not just personal trauma, but can also impact the victim’s sense of self-worth and their ability to trust others. While there are laws in 34 states against the non-consensual publishing of explicit images, on top of the added complications if the victim is under 18, this does little to impact the situation.
  • Schools and institutions need to let their learners know that they have access to support. Provide them with documentation on what to do when they encounter cyberbullying, particularly in more serious forms of harassment like revenge porn. Give them guides as to what their immediate actions should be — filing Digital Millennium Copyright Act (DMCA) takedown requests, and contacting the police. Where possible, provide free or subsidized online counseling services. Above all else, make it clear that being a teen doesn’t mean they should be less sensitive to cyberbullying, that your institution takes it seriously, and they will be treated respectfully.

Conclusion

  • Remote learning can provide the distance and isolation that can help cyberbullying to thrive. Teachers and parents must take time to understand the methods and signs of this form of abuse and maintain an open dialogue to help combat it. Important too is ensuring that all remote learners have a robust system of support to handle the damaging types of bullying they can face.
  • Amanda Winstead is a freelance writer out of Portland, Oregon focusing on many topics including educational technology. Along with writing she enjoys traveling, reading, working out, and going to concerts. If you want to follow her writing journey, or even just say hi you can find her on Twitter @AmandaWinsteadd.
    Share this:
    Share this page via Email Share this page via Stumble Upon Share this page via Digg this Share this page via Facebook Share this page via Twitter Share this page via Google Plus

Doing Research? Search My Archives

Saturday, June 19th, 2021

Search
If there is any topic related to education that you are researching or just interested in, you can search this site. You can also go to my five archive pages on the left of my home page and search there. After a daily post has been up for about a month, the individual items are moved to one on my five archive pages. While you can also search the Internet, the items stored on my archive pages have been vetted for quality and accuracy by someone who has been in education full time since 1969.

The first three topics deal with social media, learning, and leadership. The fourth features my daily inspirational quotes. There are well over one thousand here and they all feature attractive images along with the quote. You could share one each day with your class or print your favorites to hand on your wall in school or at home. They contain good advice and tips that can make your day. The final page is my humor/music/cool stuff grab bag. Rather than searching here, you can just scroll through the items looking for something entertaining. You can’t miss. Have fun and come back tomorrow for another bunch of my Net Nuggets.

Share this:
Share this page via Email Share this page via Stumble Upon Share this page via Digg this Share this page via Facebook Share this page via Twitter Share this page via Google Plus

Weapons of Mass Instruction: A Schoolteacher’s Journey Through the Dark World of Compulsory Schooling by John Taylor Gatto

Sunday, May 23rd, 2021
Weapons of Mass Instruction

Weapons of Mass Instruction: A Schoolteacher’s Journey Through the Dark World of Compulsory Schooling by John Taylor Gatto explains how the “Germain” system of schooling adopted in the US was designed to produce docile factory workers and not original thinkers. As you read this important book reflect on how your schooling and the current schools in your community use the weapons of mass instruction John describes.

Prologue: Against School

  • John’s experience shows that the main theme in secondary schools in the US is boredom. This can be traced back to our school’s Prussian heritage which offered a design aimed at producing mediocre intellects that would ensure a population composed mostly of docile and incomplete citizens. In other words, a manageable population. This type of schooling precludes critical thinking and strives to make children compliant and as alike as possible. At some point, they get sorted into manual labor and college tracks. The unfit are tagged with bad grades, remedial placements, and other punishments.
  • Not only are students designed to engage in mass production, it’s vital that they also engage in mass consumption of things they may not need. They are sitting ducks for the folks in marketing. The good news is that once you discover the tricks and traps of modern schooling, they are easy to avoid. This book promises to help you do just that.

1. Everything You Know About School is Wrong

  • This chapter focuses on the history of American schools. Prior to the school for all movement of the mid 19th century, children were included in family work, thinking, and inventing. Education was open-sourced and goals included self-reliance, ingenuity, courage, competence, and other frontier virtues. As students in factory schools, they became consumers of facts rather than producers of anything. While original thinking was patronized at times, it was subtly discouraged. There was also the beginning of the shift from local control to federal influence as school districts became larger, more bureaucratic, and less efficient.

2. Walkabout: London

  • Here we are introduced to the concept of open-source learning. This is the learning that happens outside of schools when individuals decide for themselves what they want to learn and who they want to learn it from. This chapter tells the stories of many people who became very successful without college degrees. Some dropped out of college. Some never spent a day in college, and some are even high school dropouts. It seems that for many passionate and driven people, school as we know it only gets in the way.
  • In the US 1.25 million students drop out each year. This takes courage and we should help these kids learn what they want to learn rather than giving up on them. Many students who do go to college end up learning little or nothing and end up with a huge debt and a grim career outlook. Perhaps more students should intentionally take up open-source learning rather than going to college. While John went to two Ivy League schools, he finds that most of what he learned that mattered happened outside of school. He also revisits the role schools play in standardizing students so they can serve corporate needs.

3. Fat Stanley and the Lancaster Amish

  • Stanley was one of John’s students with an attendance problem. What John discovered was that he was skipping school to in turn work for free for five relatives who had their own businesses. He wanted to learn how to run a business so he could be running his own by the time he was 21. Once John knew this he started reporting Stanly as present as he knew that Stanley was learning more than John could teach him in school.
  • We then look at the Amish with a focus on their values. While they never attend high school, they are successful entrepreneurs. They are innovative, take risks, have a strong work ethic, have high standards of craftsmanship, and use their families as their labor force. They are also legendary good neighbors. Amish children all experience practical internships and apprenticeships supervised by adults. In a sense, Stanley had discovered the secret of the Amish and adopted it for himself.

4. David Sarnott’s Classroom

  • David Sarnoff arrived from Russia at the age of nine. His father promptly died and he taught himself English and got a job selling newspapers to be the family breadwinner. In five months he was fluent with no school. At fourteen he had his own newsstand. When he saw an ad for an office boy at Marconi Wireless he crashed a line of 500 boys and got the job. The lesson here is that waiting your turn is often the worst way to get what you want. As an office boy, he taught himself telegraphy and soon found himself on the leading edge of technology. At the age of 39, he became president of the Company then called RCA. He did all this without one day of school.
  • John believes that if we taught kids to think critically and express themselves effectively that they wouldn’t put up with the nonsense schools force down their throats. Borrowing from a brochure he had recently seen at Harvard he cites qualities beyond grades that are needed for success. They included the ability to: analyze data, define problems, extract meaning from piles of information, conceptualize, collaborate, and convince others. John notes that none of these were taught in his district by policy.
Share this:
Share this page via Email Share this page via Stumble Upon Share this page via Digg this Share this page via Facebook Share this page via Twitter Share this page via Google Plus